Implementing an e-commerce curriculum in a CIS program
CCSC '00 Proceedings of the fourteenth annual consortium on Small Colleges Southeastern conference
The challenges of designing lab exercises for a curriculum in computer security
Journal of Computing Sciences in Colleges
Embedding information security curricula in existing programmes
Proceedings of the 1st annual conference on Information security curriculum development
Maintaining ethical standards for a computer security curriculum
Proceedings of the 1st annual conference on Information security curriculum development
Developing and enhancing a computer and network security curriculum
Journal of Computing Sciences in Colleges
Meeting the criteria for a Center of Academic Excellence (CAE) in information assurance education
Journal of Computing Sciences in Colleges
A computer forensics minor curriculum proposal
Journal of Computing Sciences in Colleges
Using visualization to teach security
Journal of Computing Sciences in Colleges
Designing web labs for teaching security concepts
Journal of Computing Sciences in Colleges
Overview of an undergraduate computer security administration curriculum based on regional needs
2009 Information Security Curriculum Development Conference
Security in computer literacy: a model for design, dissemination, and assessment
Proceedings of the 42nd ACM technical symposium on Computer science education
Designing a masters program in cybersecurity and leadership
Proceedings of the 13th annual conference on Information technology education
Hi-index | 0.01 |
Attacks on the computing infrastructure have gained prominence as the world harnessed the business transaction capability of the Internet in the last few years. Denial of service attacks and viruses cripple systems, making them unavailable to users and often destroying data. Information theft allows the thief to assume false identities, steal trade secrets and classified information, and perform transactions with accounts owned by others. There is a shortage of skilled computer security professionals capable of reducing vulnerabilities in computing systems.This paper describes the process of creating a computer security and information assurance (CSIA) curriculum Bachelors degree. The process begins with determining goals, followed by developing a plan of action and ends with determining a curriculum consisting of new computer science and interdisciplinary synthesis courses.